Supercharge Your Innovation With Domain-Expert AI Agents!

Subject credibility verification method and system under mandatory access control

A technology of mandatory access control and verification method, applied in the subject trusted verification method and system field under mandatory access control, can solve problems such as system call reference value errors, and achieve the effect of avoiding reference value errors and enhancing security protection.

Active Publication Date: 2020-05-15
BEIJING UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In view of this, the embodiment of the present invention provides a subject credible verification method and system under mandatory access control, to solve the problem that the system call of the process may be tampered with during the loading process of the application program, resulting in the occurrence of a base value error. defect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Subject credibility verification method and system under mandatory access control
  • Subject credibility verification method and system under mandatory access control
  • Subject credibility verification method and system under mandatory access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0034] The core of access control is the authorization policy. Divided by authorization strategy, the access control model can be divided into: traditional access control model (such as: DAC\MAC\ACL), role-based access control (such as: RBAC) model, task-based and workflow-based access control (such as : TBAC) model, task and role-based access co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a subject credibility verification method and system under mandatory access control. The method comprises an initialization stage and an authority auditing stage. The method specifically comprises the steps of obtaining a binary file of an application and a corresponding dynamic link library and performing measurement to obtain an initial reference value; and the authority auditing stage comprises the following steps: loading a process of an application program to a memory, measuring an ELF file of the application program in the loading process, and comparing a measurement result with an initial reference value to obtain a first comparison result; and controlling loading of the application program according to the first comparison result. Accordingto the subject credibility verification method and system. In the mandatory access control model, main body credibility verification is carried out before process loading, during loading and during running, so that credibility verification of a process loading stage is realized, the situation that a reference value is wrong due to the fact that system calling of a loading process is tampered is effectively avoided, and safety protection of a system is enhanced.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a subject credible verification method and system under mandatory access control. Background technique [0002] In the mandatory access control model, by assigning corresponding types and sensitivity levels to subjects and objects in the system, combined with policy rules, the process of accessing objects by subjects can be controlled, and different roles can be controlled in a sufficiently fine-grained manner. The executed subject has different authority to the object, and different subjects also have different authority to the same object. But in the traditional mandatory access control model, the permission control is fine-grained enough, but it is not secure enough. [0003] A method for checking process integrity in real time is described in the prior art, including monitoring the process that is about to run in memory and judging whether the process is the first executio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 张建标陶务升黄浩翔冯星伟万永祺曹雪琛
Owner BEIJING UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More